Architecture
Learn more about the components that make up K8sGateway. These components work together to provide traffic management, security, and resiliency for your apps.
Component architecture
The following image shows the different components that make up the K8sGateway control and data plane. These components work together to translate gateway custom resources into Envoy configuration. The Envoy configuration controls the behavior of the gateway proxies that serve your apps.
- The config and secret watcher components in the
gloo
pod watch the cluster for new Kubernetes Gateway API and K8sGateway resources, such as Gateways, HTTPRoutes, or RouteOptions. - When the config or secret watcher detect new or updated resources, it sends the resource configuration to the K8sGateway translation engine.
- The translation engine translates Kubernetes Gateway API and K8sGateway resources into Envoy configuration. All Envoy configuration is consolidated into an xDS snapshot.
- The reporter receives a status report for every resource that is processed by the translator.
- The reporter writes the resource status back to the etcd data store.
- The xDS snapshot is provided to the K8sGateway xDS server component in the
gloo
pod. - Gateway proxies in the cluster pull the latest Envoy configuration from the K8sGateway xDS server.
- Users send a request to the IP address or hostname that the gateway proxy is exposed on.
- The gateway proxy uses the listener and route-specific configuration that was provided in the xDS snapshot to perform routing decisions and forward requests to destinations in the cluster.
Config watcher
The config watcher component is part of the K8sGateway control plane and watches the cluster for new or updated Kubernetes Gateway API and K8sGateway resources, such as Gateways, HTTPRoutes, and Upstreams. When the config watcher detects new or updated resources, it sends the Kubernetes configuration to the K8sGateway translation engine.
Secret watcher
The secret watcher component is part of the K8sGateway control plane and watches a secret store for updates to secrets. For example, you might use a Kubernetes Secret to store the AWS access key and secret key credentials for an Upstream to access an AWS Lambda. However, you can configure K8sGateway to also watch other secret stores.
Endpoint discovery
The endpoint discovery component is part of the K8sGateway control plane and watches service registries such as Kubernetes for IP addresses and hostnames that are associated with services. Each endpoint requires its own plug-in that supports the discovery functionality. For example, Kubernetes runs its own endpoint discovery goroutine. When endpoint discovery discovers a new or updated endpoint, the configuration is stored in etcd.
Translation engine
The K8sGateway translator receives snapshots of all the Kubernetes Gateway API, Kubernetes API, and K8sGateway resources that you create or update. The translator starts a new translation loop for each update to translate these resources into valid Envoy configuration. The Envoy configuration is stored in an Envoy xDS snapshot.
The following image shows the different stages of a translation cycle.
-
The translation cycle starts by defining Envoy clusters from all configured Upstream and Kubernetes service resources. Clusters in this context are groups of similar hosts. Each Upstream has a type that determines how the Upstream is processed. Correctly configured Upstreams and Kubernetes services are converted into Envoy clusters that match their type, including information like cluster metadata.
-
The next step in the translation cycle is to process all the functions on each Upstream. Function-specific cluster metadata is added and is later processed by function-specific Envoy filters.
-
In the next step, all Envoy routes are generated. Routes are generated for each route rule that is defined on the HTTPRoute and RouteOption resources. When all of the routes are created, the translator processes any VirtualHostOption, ListenerOption, and HttpListenerOption resources, aggregates them into Envoy virtual hosts, and adds them to a new Envoy HTTP Connection Manager configuration.
-
Filter plug-ins are queried for their filter configurations, generating the list of HTTP and TCP Filters that are added to the Envoy listeners.
-
Finally, an xDS snapshot is composed of the all the valid endpoints (EDS), clusters (CDS), route configs (RDS), and listeners (LDS). The snapshot is sent to the K8sGateway xDS server. Gateway proxies in your cluster watch the xDS server for new config. When new config is detected, the config is pulled into the gateway proxy.
Reporter
The reporter component receives a validation report for every K8sGateway resource that was processed by the translator. Any invalid configuration is reported back to the user through the Kubernetes storage layer. Invalid resources are marked as rejected
and an error message is captured in the resource configuration.
xDS Server
The final snapshot is passed to the xDS Server, which notifies Envoy of a successful config update, updating the Envoy cluster with a new configuration to match the desired state set expressed by K8sGateway.
Discovery architecture
K8sGateway comes with a built-in service discovery feature that can scan the Kubernetes services and Functions in your cluster and automatically create K8sGateway Upstream resources for them to facilitate routing and self-service. To have more control over the services you want to create Upstreams for, you can disable service discovery and instead create Upstreams manually.
The following resources can be discovered automatically:
- Kubernetes Services
- AWS Lambda Functions
- OpenAPI-based Functions
To enable automatic discovery of services, see Discovery. To learn more about Upstreams, see Upstreams.
The following image shows how the endpoint discovery component discovers Kubernetes services and Functions and automatically creates Upstream resources for them.